Skip content
Insights

The latest opinions from our industry experts.

Insights, reports and opinions from LRQA experts.

The latest opinions from our industry experts.

451 460 601 results

  • PED: Five questions to ask your sub-contractors.

    Don't let your sub-contractors put you at risk of running afoul of the Pressure Equipment Directive. We give...

    Read more
    PED five questions for subcontractors
  • The fundamentals of web application security

    With weak security being a major flaw of most web applications, we take a thorough look at how...

    Read more
    LRQA logo on navy background
  • How to effectively conduct a cyber security audit

    Find out why cyber security audits are crucial to your business, and how you can conduct one that...

    Read more
    LRQA logo on navy background
  • Current cyber security threats and emerging trends

    Find out about the current cyber security threats that your business should be aware of, and any emerging...

    Read more
    LRQA logo on navy background
  • CVE-2018-5240: Symantec Management Agent (Altiris) Privilege Escalation

    During a recent red team exercise, we discovered a vulnerability within the latest versions of the Symantec Management...

    Read more
  • CVE-2018-12897: Solarwinds Dameware Mini Remote Control Local SEH Buffer...

    Dameware Mini Remote Control (MRC) is a remote administration utility allowing remote access to end user devices for...

    Read more
  • Introducing Scrounger - iOS and Android mobile application penetration...

    Scrounger is a modular tool designed to perform the routine tasks required during a mobile application security assessment. ...

    Read more
  • Extending C2 Lateral Movement – Invoke-Pbind

    Invoke-Pbind is a mini post exploitation framework written in PowerShell, which builds C2 communications over SMB named pipes...

    Read more
  • The ultimate guide to cyber security risk assessments

    We go into detail about the steps you need to take to conduct a cyber security risk assessment....

    Read more
    LRQA logo on navy background
  • Using PoolTags to Fingerprint Hosts

    Commonly, malware will fingerprint the host it executes on, in an attempt to discover more about its environment...

    Read more

Error

Error

No results found

No results found that match your query

Loading results